Maxthon 1.2.0 and 1.2.1 allows remote attackers to bypass the security ID and use restricted plugin API functions via script that includes the max.src file into the source page.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/13073 | vdb entry exploit |
http://secunia.com/advisories/14918 | patch vendor advisory third party advisory |
http://www.osvdb.org/15424 | vdb entry |
http://www.raffon.net/advisories/maxthon/multvulns.html | patch vendor advisory exploit |